Compare commits

..

1 Commits

Author SHA1 Message Date
8c02ce68d2 Update content 2023-06-02 09:09:13 +00:00
28 changed files with 230 additions and 391 deletions

View File

@ -134,8 +134,6 @@ Response Parameters
+-----------------------+-----------------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------+
| protect_status | Integer | WAF status of the protected domain name. |
| | | |
| | | - -1: Bypassed. Requests are directly sent to the backend servers without passing through WAF. |
| | | |
| | | - 0: Suspended. WAF only forwards requests for the domain name but does not detect attacks. -1: Enabled. WAF detects attacks based on the configured policy. |
+-----------------------+-----------------------------------------------------------------------------------------+---------------------------------------------------------------------------------------------------------------------------------------------------------------+
| access_status | Integer | Whether a domain name is connected to WAF. |
@ -326,7 +324,7 @@ Example Requests
.. code-block:: text
POST https://{Endpoint}/v1/{project_id}/premium-waf/host?enterprise_project_id=0
POST https://{Endpoint}/v1/{project_id}/premium-waf/host?
{
"hostname" : "www.demo.com",

View File

@ -68,8 +68,6 @@ Response Parameters
+-----------------------+-----------------------------------------------------------+----------------------------------------------------------------------------------------------------------------------------+
| protect_status | Integer | WAF status of the protected domain name. The value can be: |
| | | |
| | | - -1: Bypassed. Requests are directly sent to the backend servers without passing through WAF. |
| | | |
| | | - 0: Suspended. WAF only forwards requests for the domain name but does not detect attacks. |
| | | |
| | | - 1: Enabled. WAF detects attacks based on the configured policy. |

View File

@ -94,8 +94,6 @@ Response Parameters
+-----------------------+---------------------------------------------------------+-------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| protect_status | Integer | WAF status of the protected domain name. The value can be: |
| | | |
| | | - -1: Bypassed. Requests are directly sent to the backend servers without passing through WAF. |
| | | |
| | | - 0: Suspended. WAF only forwards requests for the domain name but does not detect attacks. |
| | | |
| | | - 1: Enabled. WAF detects attacks based on the configured policy. |

View File

@ -45,7 +45,7 @@ Request Parameters
+--------------------+-----------------+-----------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| Parameter | Mandatory | Type | Description |
+====================+=================+=================+============================================================================================================================================================================================================+
| name | No | String | Rule name. |
| name | Yes | String | Rule name. |
+--------------------+-----------------+-----------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| description | No | String | Rule description. |
+--------------------+-----------------+-----------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+

View File

@ -73,7 +73,9 @@ Request Parameters
| | | | |
| | | | - Israel: Israel |
| | | | |
| | | | - Iraq: Afghanistan |
| | | | - Iraq: Iraq |
| | | | |
| | | | - Afghanistan: Afghanistan |
| | | | |
| | | | - Libya: Libya |
| | | | |
@ -150,7 +152,9 @@ Response Parameters
| | | |
| | | - Israel: Israel |
| | | |
| | | - Iraq: Afghanistan |
| | | - Iraq: Iraq |
| | | |
| | | - Afghanistan: Afghanistan |
| | | |
| | | - Libya: Libya |
| | | |

View File

@ -88,7 +88,9 @@ Response Parameters
| | | |
| | | - Israel: Israel |
| | | |
| | | - Iraq: Afghanistan |
| | | - Iraq: Iraq |
| | | |
| | | - Afghanistan: Afghanistan |
| | | |
| | | - Libya: Libya |
| | | |
@ -163,7 +165,7 @@ Example Requests
.. code-block:: text
DELETE https://{Endpoint}/v1/{project_id}/waf/policy/{policy_id}/geoip/{rule_id}?enterprise_project_id=0
DELETE https://{Endpoint}/v1/{project_id}/waf/policy/{policy_id}/geoip/{rule_id}?
Example Responses
-----------------

View File

@ -45,7 +45,7 @@ Request Parameters
+=================+=================+=================+==============================================================================================================+
| X-Auth-Token | Yes | String | User token. It can be obtained by calling the IAM API (value of **X-Subject-Token** in the response header). |
+-----------------+-----------------+-----------------+--------------------------------------------------------------------------------------------------------------+
| Content-Type | Yes | String | Content type. |
| Content-Type | No | String | Content type. |
| | | | |
| | | | Default: **application/json;charset=utf8** |
+-----------------+-----------------+-----------------+--------------------------------------------------------------------------------------------------------------+

View File

@ -13,17 +13,17 @@ This API is used to delete a reference table.
URI
---
DELETE /v1/{project_id}/waf/valuelist/{table_id}
DELETE /v1/{project_id}/waf/valuelist/{valuelist_id}
.. table:: **Table 1** Path Parameters
+------------+-----------+--------+---------------------------------------------------------------------------------------------+
| Parameter | Mandatory | Type | Description |
+============+===========+========+=============================================================================================+
| project_id | Yes | String | Project ID |
+------------+-----------+--------+---------------------------------------------------------------------------------------------+
| table_id | Yes | String | Reference table ID. It can be obtained by calling the API Querying the Reference Table List |
+------------+-----------+--------+---------------------------------------------------------------------------------------------+
+--------------+-----------+--------+---------------------------------------------------------------------------------------+
| Parameter | Mandatory | Type | Description |
+==============+===========+========+=======================================================================================+
| project_id | Yes | String | Project ID |
+--------------+-----------+--------+---------------------------------------------------------------------------------------+
| valuelist_id | Yes | String | Valuelist ID. It can be obtained by calling the API Querying the Reference Table List |
+--------------+-----------+--------+---------------------------------------------------------------------------------------+
Request Parameters
------------------

View File

@ -58,7 +58,7 @@ Rule Management
- :ref:`Deleting a Geolocation Access Control Rule <deletegeoiprule>`
- :ref:`Querying the Reference Table List <listvaluelist>`
- :ref:`Creating a Reference Table <createvaluelist>`
- :ref:`Querying a Reference Table by ID <showvaluelist>`
- :ref:`Querying a Reference Table <showvaluelist>`
- :ref:`Modifying a Reference Table <updatevaluelist>`
- :ref:`Deleting a Reference Table <deletevaluelist>`
@ -119,6 +119,6 @@ Rule Management
deleting_a_geolocation_access_control_rule
querying_the_reference_table_list
creating_a_reference_table
querying_a_reference_table_by_id
querying_a_reference_table
modifying_a_reference_table
deleting_a_reference_table

View File

@ -13,17 +13,17 @@ This API is used to modify a reference table.
URI
---
PUT /v1/{project_id}/waf/valuelist/{table_id}
PUT /v1/{project_id}/waf/valuelist/{valuelist_id}
.. table:: **Table 1** Path Parameters
+------------+-----------+--------+---------------------------------------------------------------------------------------------+
| Parameter | Mandatory | Type | Description |
+============+===========+========+=============================================================================================+
| project_id | Yes | String | Project ID |
+------------+-----------+--------+---------------------------------------------------------------------------------------------+
| table_id | Yes | String | Reference table ID. It can be obtained by calling the API Querying the Reference Table List |
+------------+-----------+--------+---------------------------------------------------------------------------------------------+
+--------------+-----------+--------+---------------------------------------------------------------------------------------+
| Parameter | Mandatory | Type | Description |
+==============+===========+========+=======================================================================================+
| project_id | Yes | String | Project ID |
+--------------+-----------+--------+---------------------------------------------------------------------------------------+
| valuelist_id | Yes | String | Valuelist ID. It can be obtained by calling the API Querying the Reference Table List |
+--------------+-----------+--------+---------------------------------------------------------------------------------------+
Request Parameters
------------------

View File

@ -37,7 +37,7 @@ Request Parameters
+=================+=================+=================+============================================+
| X-Auth-Token | Yes | String | User token |
+-----------------+-----------------+-----------------+--------------------------------------------+
| Content-Type | Yes | String | Content type |
| Content-Type | No | String | Content type |
| | | | |
| | | | Default: **application/json;charset=utf8** |
+-----------------+-----------------+-----------------+--------------------------------------------+
@ -88,7 +88,9 @@ Response Parameters
| | | |
| | | - Israel: Israel |
| | | |
| | | - Iraq: Afghanistan |
| | | - Iraq: Iraq |
| | | |
| | | - Afghanistan: Afghanistan |
| | | |
| | | - Libya: Libya |
| | | |

View File

@ -45,7 +45,7 @@ Request Parameters
+=================+=================+=================+==============================================================================================================+
| X-Auth-Token | Yes | String | User token. It can be obtained by calling the IAM API (value of **X-Subject-Token** in the response header). |
+-----------------+-----------------+-----------------+--------------------------------------------------------------------------------------------------------------+
| Content-Type | Yes | String | Content type. |
| Content-Type | No | String | Content type. |
| | | | |
| | | | Default: **application/json;charset=utf8** |
+-----------------+-----------------+-----------------+--------------------------------------------------------------------------------------------------------------+

View File

@ -2,28 +2,28 @@
.. _ShowValueList:
Querying a Reference Table by ID
================================
Querying a Reference Table
==========================
Function
--------
This API is used to query a reference table by ID.
This API is used to query a reference table.
URI
---
GET /v1/{project_id}/waf/valuelist/{table_id}
GET /v1/{project_id}/waf/valuelist/{valuelist_id}
.. table:: **Table 1** Path Parameters
+------------+-----------+--------+---------------------------------------------------------------------------------------------+
| Parameter | Mandatory | Type | Description |
+============+===========+========+=============================================================================================+
| project_id | Yes | String | Project ID |
+------------+-----------+--------+---------------------------------------------------------------------------------------------+
| table_id | Yes | String | Reference table ID. It can be obtained by calling the API Querying the Reference Table List |
+------------+-----------+--------+---------------------------------------------------------------------------------------------+
+--------------+-----------+--------+---------------------------------------------------------------------------------------+
| Parameter | Mandatory | Type | Description |
+==============+===========+========+=======================================================================================+
| project_id | Yes | String | Project ID |
+--------------+-----------+--------+---------------------------------------------------------------------------------------+
| valuelist_id | Yes | String | Valuelist ID. It can be obtained by calling the API Querying the Reference Table List |
+--------------+-----------+--------+---------------------------------------------------------------------------------------+
Request Parameters
------------------

View File

@ -53,7 +53,7 @@ Request Parameters
+=================+=================+=================+==============================================================================================================+
| X-Auth-Token | Yes | String | User token. It can be obtained by calling the IAM API (value of **X-Subject-Token** in the response header). |
+-----------------+-----------------+-----------------+--------------------------------------------------------------------------------------------------------------+
| Content-Type | Yes | String | Content type. |
| Content-Type | No | String | Content type. |
| | | | |
| | | | Default: **application/json;charset=utf8** |
+-----------------+-----------------+-----------------+--------------------------------------------------------------------------------------------------------------+

View File

@ -112,7 +112,9 @@ Response Parameters
| | | |
| | | - Israel: Israel |
| | | |
| | | - Iraq: Afghanistan |
| | | - Iraq: Iraq |
| | | |
| | | - Afghanistan: Afghanistan |
| | | |
| | | - Libya: Libya |
| | | |

View File

@ -75,7 +75,9 @@ Request Parameters
| | | | |
| | | | - Israel: Israel |
| | | | |
| | | | - Iraq: Afghanistan |
| | | | - Iraq: Iraq |
| | | | |
| | | | - Afghanistan: Afghanistan |
| | | | |
| | | | - Libya: Libya |
| | | | |
@ -152,7 +154,9 @@ Response Parameters
| | | |
| | | - Israel: Israel |
| | | |
| | | - Iraq: Afghanistan |
| | | - Iraq: Iraq |
| | | |
| | | - Afghanistan: Afghanistan |
| | | |
| | | - Libya: Libya |
| | | |

View File

@ -8,6 +8,8 @@ Change History
+-----------------------------------+----------------------------------------------------------------------------------------------------+
| Released On | Description |
+===================================+====================================================================================================+
| 2023-04-23 | Revised the document based on review comments. |
+-----------------------------------+----------------------------------------------------------------------------------------------------+
| 2023-03-30 | - Added "Geographical Location Codes." |
| | - Revised the document based on review comments. |
+-----------------------------------+----------------------------------------------------------------------------------------------------+

View File

@ -18,7 +18,7 @@ import os
import sys
extensions = [
'otcdocstheme',
'otcdocstheme'
]
otcdocs_auto_name = False
@ -30,17 +30,6 @@ otcdocs_repo_name = 'docs/web-application-firewall-dedicated'
otcdocs_git_fqdn = 'gitea.eco.tsi-dev.otc-service.com'
otcdocs_git_type = 'gitea'
# Those variables are needed for indexing into OpenSearch
otcdocs_doc_environment = 'internal'
otcdocs_doc_link = '/web-application-firewall-dedicated/api-ref/'
otcdocs_doc_title = 'API Reference'
otcdocs_doc_type = 'api-ref'
otcdocs_service_category = 'security-services'
otcdocs_service_title = 'Dedicated Web Application Firewall'
otcdocs_service_type = 'wafd'
otcdocs_search_environment = 'hc_de'
otcdocs_search_url = "https://opensearch.eco.tsi-dev.otc-service.com/"
# If extensions (or modules to document with autodoc) are in another directory,
# add these directories to sys.path here. If the directory is relative to the
# documentation root, use os.path.abspath to make it absolute, like shown here.

File diff suppressed because it is too large Load Diff

View File

@ -1,2 +0,0 @@
[html writers]
table-style: table, caption-top

View File

@ -1,4 +0,0 @@
==================================================
Dedicated Web Application Firewall - Best Practice
==================================================

View File

@ -1,10 +1,7 @@
sphinx>=2.0.0,!=2.1.0 # BSD
otcdocstheme # Apache-2.0
# releasenotes
reno>=3.1.0 # Apache-2.0
otc-sphinx-directives>=0.1.0
sphinx-minify>=0.0.1 # Apache-2.0
git+https://gitea.eco.tsi-dev.otc-service.com/infra/otc-metadata.git#egg=otc_metadata

View File

@ -31,17 +31,6 @@ otcdocs_repo_name = 'docs/web-application-firewall-dedicated'
otcdocs_git_fqdn = 'gitea.eco.tsi-dev.otc-service.com'
otcdocs_git_type = 'gitea'
# Those variables are needed for indexing into OpenSearch
otcdocs_doc_environment = ''
otcdocs_doc_link = ''
otcdocs_doc_title = ''
otcdocs_doc_type = ''
otcdocs_service_category = 'security-services'
otcdocs_service_title = 'Dedicated Web Application Firewall'
otcdocs_service_type = 'wafd'
otcdocs_search_environment = 'hc_de'
otcdocs_search_url = "https://opensearch.eco.tsi-dev.otc-service.com/"
# If extensions (or modules to document with autodoc) are in another directory,
# add these directories to sys.path here. If the directory is relative to the
# documentation root, use os.path.abspath to make it absolute, like shown here.

View File

@ -8,8 +8,6 @@ Web Application Firewall (WAF) keeps web services stable and secure. It examines
:class: container-sbv
.. service_card::
:environment: internal
:service_type: wafd
:umn: This document helps you know about the Web Application Firewall (Dedicated) and guide you on how to use the service.
:api-ref: This document describes application programming interfaces (APIs) of the Web Application Firewall (Dedicated) and provides API parameter description and example values.
:best-practice: To use Web Application Firewall (Dedicated) more securely, reliably, flexibly, and efficiently, you are advised to follow the following best practices.
:api-ref: This document describes application programming interfaces (APIs) of the Web Application Firewall (Dedicated) and provides API parameter description and example values.

166
tox.ini

File diff suppressed because it is too large Load Diff

View File

@ -18,7 +18,7 @@ import os
import sys
extensions = [
'otcdocstheme',
'otcdocstheme'
]
otcdocs_auto_name = False
@ -30,17 +30,6 @@ otcdocs_repo_name = 'docs/web-application-firewall-dedicated'
otcdocs_git_fqdn = 'gitea.eco.tsi-dev.otc-service.com'
otcdocs_git_type = 'gitea'
# Those variables are needed for indexing into OpenSearch
otcdocs_doc_environment = 'internal'
otcdocs_doc_link = '/web-application-firewall-dedicated/umn/'
otcdocs_doc_title = 'User Guide'
otcdocs_doc_type = 'umn'
otcdocs_service_category = 'security-services'
otcdocs_service_title = 'Dedicated Web Application Firewall'
otcdocs_service_type = 'wafd'
otcdocs_search_environment = 'hc_de'
otcdocs_search_url = "https://opensearch.eco.tsi-dev.otc-service.com/"
# If extensions (or modules to document with autodoc) are in another directory,
# add these directories to sys.path here. If the directory is relative to the
# documentation root, use os.path.abspath to make it absolute, like shown here.